Leakage of digital currency
digital currency can be considered as a virtual currency based on node network and digital encryption algorithm. The core characteristics of digital currency are mainly reflected in three aspects:
1. Because digital currency comes from some open algorithm, it has no issuer, so no one or organization can control its issuance
When determining the number of solutions, the total amount of digital currency is fixed, which fundamentally eliminates the possibility of inflation caused by excessive issuance of virtual currency
3. Because the transaction process needs the approval of each node in the network, the transaction process of digital currency is safe enough
extended information:
the central bank concted a private test on this digital currency, and some civil servants' salaries were received in the form of digital currency
screenshots of the digital currency wallet applications launched by Agricultural Bank of China, China Construction Bank and Bank of China are widely spread on the Internet, showing various functions, including the ability for depositors to track digital currency transactions and associate digital currency wallets with their existing bank accounts
1, has rich data content, such as stock, fund, futures, digital currency and other market data, corporate finance, fund manager and other basic data
2. SDK development kit supports language and provides HTTP restful interface to facilitate the use of different people to the greatest extent
3. Provide a variety of data storage methods, such as Oracle, mysql, mongodb, HDF5, CSV, etc., to provide performance guarantee for data acquisition.
Abstract: e to the development of network technology, affecting all aspects of people's lives, people's network activities are more and more frequent, followed by higher and higher security requirements, and higher and higher confidentiality requirements for their own network activities, Ensure that people in the network activities of their own information and some related information confidentiality requirements, to ensure the security and confidentiality of the network. Through the introction of information encryption technology, this paper puts forward an idea of improving RSA algorithm, lists some examples of applying information encryption technology, and emphasizes the importance of information encryption technology in maintaining network security< Key words: information encryption technology, network security, RSA, encryption algorithm
1. Introction
information encryption technology is the core technology of information security. Especially in today's e-commerce, e-cash, digital currency, network banking and other network business rapid rise. How to protect the information security from being stolen, tampered or destroyed has been paid more and more attention. The key to solve this problem is information encryption technology. The so-called encryption is the process of converting the readable information called "plaintext" into "ciphertext"; Decryption is the process of restoring "ciphertext" to "plaintext". Encryption and decryption should use cryptographic algorithm to achieve. Cryptographic algorithm is a computable process used to hide and reveal information. Generally, the more complex the algorithm is, the more secure the ciphertext is. In the encryption technology, the key is essential, the key is to make the cipher algorithm run in a specific way and proce a specific ciphertext value[ 1] The use of encryption algorithm can protect information security from theft, tampering or destruction
2. Information encryption technology
2.1 encryption mode
encryption algorithm can be regarded as a complex function transformation, x = (y, K) x represents ciphertext, that is, the character sequence obtained after encryption, y represents plaintext, that is, the character sequence to be encrypted, and K represents the key. After encryption is completed, the ciphertext can be sent to the receiver through an unsafe channel, Only the receiver with the decryption key can decrypt the ciphertext, that is, the plaintext can be obtained by inverse transformation[ 2]
2.2 encryption algorithm
symmetric algorithm is sometimes called the traditional cryptographic algorithm, that is, the encryption key can be calculated from the decryption key, and vice versa. In most symmetric algorithms, the encryption / decryption key is the same. These algorithms are also called secret key or single key algorithms, which require the sender and receiver to agree on a key before secure communication. The security of symmetric algorithm depends on the key, and revealing the key means that anyone can encrypt / decrypt the message. As long as the communication needs to be kept secret, the key must be kept secret. Therefore, symmetric algorithm means that the encryption and decryption processes use the same key, such as DES, 3DES, AES and other algorithms belong to symmetric algorithm
asymmetric algorithm is also called public key algorithm. The key used for encryption is different from the key used for decryption, and the decryption key cannot be calculated according to the encryption key (at least for a reasonably long time). The reason why it is called public key algorithm is that the encryption key can be made public, that is, the stranger can encrypt the information with the encryption key, but only with the corresponding decryption key can the information be decrypted. But it is difficult to derive the private key from the public key. RSA [1], DSA and other algorithms are asymmetric algorithms, among which RSA is the most widely used, which can not only be used for encryption but also digital signature[ 3]
2.3 an improvement on the asymmetric encryption algorithm RSA
generally, the security of the asymmetric encryption algorithm RSA mainly depends on the large number, but whether it is equal to the decomposition of large number has not been proved in theory, because it is necessary to decompose large number to crack RSA without proof. Therefore, the most obvious attack method is to decompose molus 10, so people choose molus greater than 10100 for security, which undoubtedly reces the event complexity of the algorithm for calculating public key and key< Therefore, based on RSA algorithm, a variant of RSA algorithm is proposed. The specific ideas are as follows:
generation of public encryption transformation ex and secret decryption transformation DX of user X: (1) randomly select n prime numbers P1, P2... PN 2) Calculate NX = P1 * P2... * PN, Ф( nx)=(p1-1)*(p2-1)*……*(rj-1)( 3) Randomly select the integer ex to satisfy (ex, Ф( nx)) =1;( 4) The Euclidean algorithm is used to calculate DX, which satisfies ex * DX ≡ 1 mod Ф( nx);( 5) Disclose NX, ex as ex, and record as ex = & lt; nx,ex>, Confidential P1, P2,..., PN, Ф( Nx) as DX, DX = & lt; p1,p2,……,pn ,dx, Ф( nxj) > Encryption algorithm: C = ex (m) = mex (MOD NX), decryption algorithm: M = DX (c) = CDX (MOD NX). In RSA algorithm, there are two keys: encryption key PK and decryption key SK, and the encryption key is public
the speed of computing 8*8 in binary case is obviously greater than that of 2*2*2*2*2*2 by proving that the speed of the algorithm is higher than that of 2*2*2*2*2*2. This proves the advanced nature of the RSA algorithm. Because of the variant of RSA algorithm or the encryption algorithm based on the original algorithm, the algorithm can be proved by mathematical inction, which basically does not violate the RSA algorithm's Wuan nature. Therefore, the security of RSA algorithm variant is guaranteed
3. Information encryption technology ensures network security
3.1 The Application of information encryption technology in e-commerce
e-commerce is changing people's life and the development process of the whole society, and network trade will cause people's comprehensive innovation in management mode, work and life style, and even business management thinking mode. At the same time, a stable network security environment is crucial to the healthy and sustainable development of e-commerce. The security of e-commerce is mainly the security of network platform and transaction information. The security of transaction information refers to the protection of both sides of the transaction from being damaged and divulged, and the confirmation of the identity of both sides of the transaction[ 4] Therefore, the application of data encryption, digital signature, digital certificate, SSL, set security protocol in e-commerce to ensure the security of e-commerce transaction information, the combination of e-commerce and information encryption technology will promote the stable development of e-commerce
3.2 encrypt anti-virus and anti-virus software. Once the encryption program itself is infected with computer virus, it will not check whether the program or data is encrypted or has digital signature. Every time you start to execute the encryption program, you should check whether it is infected by the virus, and you should also check the files that need to be encrypted and decrypted. This checking mechanism should be confidential. Therefore, encryption technology is also used in some anti-virus or antivirus software[ 5]
3.3 encryption of network database
the public channel and computer storage system in transmission are very fragile. As long as you use a PC to access the Internet, you can steal many other people's useful information, even all kinds of passwords, so it is necessary to take measures to protect the data. Users need to protect the key data effectively. Because the traditional way of database protection is realized by setting password and access rights. The key to solve this problem is to encrypt the data itself, so that even if the data is unfortunately leaked or lost, it is difficult to be deciphered by a third party. The running platform of large database management system is usually windows nt or UNIX, and the security level of these operating systems is usually C1 and C2. They have the security functions of user registration, user identification, arbitrary access control and auditing. Although DBMS adds many security measures on the basis of OS, OS and DBMS still lack effective protection measures for database files. It can be seen that data encryption is necessary for the external or internal security management of the system[ 6]
3.4 the combination of information encryption technology and VPN
nowadays, more and more companies are moving towards collectivization. A company may have subsidiaries or offices in different regions, and each organization has its own LAN, but LAN users want to connect these LANs together to form a WAN. The application of VPN technology can solve this problem, In fact, many companies have done this, but they usually use leased private lines to connect these LANs. Their concern is the security and confidentiality of file transmission. Now routers with information encryption function are everywhere, which makes it possible for people to connect these LANs through the Internet, When the data leaves the local area network where the sender is located, the data is first encrypted by the router connected to the VPN by the client. The data is transmitted in the form of ciphertext on the Internet. When the router reaches the destination local area network, the router will decrypt the data, so that the users in the destination local area network can see the plaintext< This paper introces the related concepts of information encryption technology, gives a simple statement of various encryption algorithms, and puts forward their own improvement suggestions for RSA algorithm. However, e to the limited personal ability, it is insufficient to give a thorough demonstration of the improved RSA algorithm. It also lists several examples of using information encryption technology to maintain network harmony, discusses the importance of information encryption technology to maintain network security, and proves that information encryption technology is an indispensable part of network security.
Abstract: e to the development of network technology, affecting all aspects of people's lives, people's network activities are more and more frequent, followed by higher and higher security requirements, and higher and higher confidentiality requirements for their own network activities, Ensure that people in the network activities of their own information and some related information confidentiality requirements, to ensure the security and confidentiality of the network. Through the introction of information encryption technology, this paper puts forward an idea of improving RSA algorithm, lists some examples of applying information encryption technology, and emphasizes the importance of information encryption technology in maintaining network security< Key words: information encryption technology, network security, RSA, encryption algorithm
1. Introction
information encryption technology is the core technology of information security. Especially in today's e-commerce, e-cash, digital currency, network banking and other network business rapid rise. How to protect the information security from being stolen, tampered or destroyed has been paid more and more attention. The key to solve this problem is information encryption technology. The so-called encryption is the process of converting the readable information called "plaintext" into "ciphertext"; Decryption is the process of restoring "ciphertext" to "plaintext". Encryption and decryption should use cryptographic algorithm to achieve. Cryptographic algorithm is a computable process used to hide and reveal information. Generally, the more complex the algorithm is, the more secure the ciphertext is. In the encryption technology, the key is essential, the key is to make the cipher algorithm run in a specific way and proce a specific ciphertext value[ 1] The use of encryption algorithm can protect information security from theft, tampering or destruction
2. Information encryption technology
2.1 encryption mode
encryption algorithm can be regarded as a complex function transformation, x = (y, K) x represents ciphertext, that is, the character sequence obtained after encryption, y represents plaintext, that is, the character sequence to be encrypted, and K represents the key. After encryption is completed, the ciphertext can be sent to the receiver through an unsafe channel, Only the receiver with the decryption key can decrypt the ciphertext, that is, the plaintext can be obtained by inverse transformation[ 2]
2.2 encryption algorithm
symmetric algorithm is sometimes called the traditional cryptographic algorithm, that is, the encryption key can be calculated from the decryption key, and vice versa. In most symmetric algorithms, the encryption / decryption key is the same. These algorithms are also called secret key or single key algorithms, which require the sender and receiver to agree on a key before secure communication. The security of symmetric algorithm depends on the key, and revealing the key means that anyone can encrypt / decrypt the message. As long as the communication needs to be kept secret, the key must be kept secret. Therefore, symmetric algorithm means that the encryption and decryption processes use the same key, such as DES, 3DES, AES and other algorithms belong to symmetric algorithm
asymmetric algorithm is also called public key algorithm. The key used for encryption is different from the key used for decryption, and the decryption key cannot be calculated according to the encryption key (at least for a reasonably long time). The reason why it is called public key algorithm is that the encryption key can be made public, that is, the stranger can encrypt the information with the encryption key, but only with the corresponding decryption key can the information be decrypted. But it is difficult to derive the private key from the public key. RSA [1], DSA and other algorithms are asymmetric algorithms, among which RSA is the most widely used, which can not only be used for encryption but also digital signature[ 3]
2.3 an improvement on the asymmetric encryption algorithm RSA
generally, the security of the asymmetric encryption algorithm RSA mainly depends on the large number, but whether it is equal to the decomposition of large number has not been proved in theory, because it is necessary to decompose large number to crack RSA without proof. Therefore, the most obvious attack method is to decompose molus 10, so people choose molus greater than 10100 for security, which undoubtedly reces the event complexity of the algorithm for calculating public key and key< Therefore, based on RSA algorithm, a variant of RSA algorithm is proposed. The specific ideas are as follows:
generation of public encryption transformation ex and secret decryption transformation DX of user X: (1) randomly select n prime numbers P1, P2... PN 2) Calculate NX = P1 * P2... * PN, Ф( nx)=(p1-1)*(p2-1)*……*(rj-1)( 3) Randomly select the integer ex to satisfy (ex, Ф( nx)) =1;( 4) The Euclidean algorithm is used to calculate DX, which satisfies ex * DX ≡ 1 mod Ф( nx);( 5) Disclose NX, ex as ex, and record as ex = & lt; nx,ex>, Confidential P1, P2,..., PN, Ф( Nx) as DX, DX = & lt; p1,p2,……,pn ,dx, Ф( nxj) > Encryption algorithm: C = ex (m) = mex (MOD NX), decryption algorithm: M = DX (c) = CDX (MOD NX). In RSA algorithm, there are two keys: encryption key PK and decryption key SK, and the encryption key is public
the speed of computing 8*8 in binary case is obviously greater than that of 2*2*2*2*2*2 by proving the program. This proves the advanced nature of the RSA algorithm. Because the variant of RSA algorithm is based on the original algorithm, the algorithm can be proved by mathematical inction. Basically, it does not violate the security of RSA algorithm, so it ensures the security of RSA algorithm variants
3. Information encryption technology ensures network security
3.1 The Application of information encryption technology in e-commerce
e-commerce is changing people's life and the development process of the whole society, and network trade will cause people's comprehensive innovation in management mode, work and life style, and even business management thinking mode. At the same time, a stable network security environment is crucial to the healthy and sustainable development of e-commerce. The security of e-commerce is mainly the security of network platform and transaction information. The security of transaction information refers to the protection of both sides of the transaction from being damaged and divulged, and the confirmation of the identity of both sides of the transaction[ 4] Therefore, the application of data encryption, digital signature, digital certificate, SSL, set security protocol in e-commerce to ensure the security of e-commerce transaction information, the combination of e-commerce and information encryption technology will promote the stable development of e-commerce
3.2 encrypt anti-virus and anti-virus software. Once the encryption program itself is infected with computer virus, it will not check whether the program or data is encrypted or has digital signature. Every time you start to execute the encryption program, you should check whether it is infected by the virus, and you should also check the files that need to be encrypted and decrypted. This checking mechanism should be confidential. Therefore, encryption technology is also used in some anti-virus or antivirus software[ 5]
3.3 encryption of network database
the public channel and computer storage system in transmission are very fragile. As long as you use a PC to access the Internet, you can steal many other people's useful information, even all kinds of passwords, so it is necessary to take measures to protect the data. Users need to protect the key data effectively. Because the traditional way of database protection is realized by setting password and access rights. The key to solve this problem is to encrypt the data itself, so that even if the data is unfortunately leaked or lost, it is difficult to be deciphered by a third party. The running platform of large database management system is usually windows nt or UNIX, and the security level of these operating systems is usually C1 and C2. They have the security functions of user registration, user identification, arbitrary access control and auditing. Although DBMS adds many security measures on the basis of OS, OS and DBMS still lack effective protection measures for database files. It can be seen that data encryption is necessary for the external or internal security management of the system[ 6]
3.4 combination of information encryption technology and VPN, The application of VPN technology can solve this problem. In fact, many companies have already done so, but they usually use leased private lines to connect these LANs. Their concern is the security and confidentiality of file transmission. Now routers with information encryption function can be seen everywhere, This makes it possible for people to connect these local area networks through the Internet. When the data leaves the local area network of the sender, the data is first encrypted by the router connected to the VPN by the client. The data is transmitted in the form of ciphertext on the Internet. When it reaches the router of the destination local area network, the router will decrypt the data, In this way, users in the local area network of the target can see the plaintext< This paper introces the related concepts of information encryption technology, gives a simple statement of various encryption algorithms, and puts forward their own improvement suggestions for RSA algorithm. However, e to the limited personal ability, it is insufficient to give a thorough demonstration of the improved RSA algorithm. It also lists several examples of using information encryption technology to maintain network harmony, discusses the importance of information encryption technology to maintain network security, and proves that information encryption technology is an indispensable part of network security< br />